Internet site authentication service

a technology for authentication services and internet sites, applied in the field of internet site authentication services, can solve the problems of adding to the complexity and cost of accessing the internet, adding to the delay of access, and creating certain types of fraud

Active Publication Date: 2007-12-25
INT BUSINESS MASCH CORP
View PDF10 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Recently, the creators of some of these sites are perpetrating a certain type of fraud.
Certificate validation locally adds to the complexity and cost of accessing the Internet.
Third-party certificate validation adds a delay to the access to the desired site and may add a cost if the third party charges for validation.
This is due, in part, to the fact that masquerading is infrequent, although highly disruptive when it exists.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet site authentication service
  • Internet site authentication service
  • Internet site authentication service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]According to the invention, the authenticity of Internet sites is verified by a combination of software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention.

[0019]The proxy intercepts web site access requests and interacts with a web-based service to validate the web site that these requests are directed to. The service makes an assessment if the requests are to a legitimate web site. If they are, then they are either forwarded or the proxy is notified with an approval message that the requests can be sent directly. If the assessment is that the site is not legitimate, then the proxy is notified that the web site that would have been accessed is probably a masquerader.

[0020]In a preferred...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and / or the behavior of the target website.

Description

TECHNICAL FIELD[0001]The field of the invention is that of checking the identity of a web site on the Internet, in particular verifying that the web site address has not been taken over by an imposter.BACKGROUND OF THE INVENTION[0002]There are millions of sites now on the Internet. Recently, the creators of some of these sites are perpetrating a certain type of fraud. In this fraud, a site masquerades as another site, typically a site engaged in e-commerce. The masquerader site has the same appearance as the authentic site, but its programming is different. The masquerader may simply pull business away from the authentic site, or it may capture personal information about a user for nefarious purposes. The information may be just the user's Internet address, or it may be obtained from the user via dialogs, and may include the user's credit card number, social security number or any such. The masquerade is facilitated through hijacking of some subset of the Internet's domain name serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/00G06F11/00G06F12/14G06F12/16G06F15/18G08B23/00G06F11/30H04L29/06
CPCH04L63/1483H04L63/1475H04L63/0281H04L63/08H04L63/0823
Inventor BANTZ, DAVID F.CHEFALAS, THOMAS E.MASTRIANNI, STEVEN J.
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products